A file that contains the configuration information used by the application router.
The application router configuration file is named xs-app.json
and its content is formatted according to JavaScript Object Notation (JSON) rules.
When a business application consists of several different apps (microservices), the application router is used to provide a single entry point to that business application. The application router is responsible for the following tasks:
-
Dispatch requests to back-end microservices (reverse proxy)
-
Authenticate users
-
Serve static content
-
In multitenancy scenarios, derive the tenant information from the URL and forward the information to the XS UAA service so that the authentication request is redirected to the appropriate tenant-specific Identity Provider (IdP), for example,using SAML “Bearer Assertions”.
The different applications (microservices) are the destinations to which the incoming requests are forwarded. The rules that determine which request should be forwarded to which destination are called routes. For every destination there can be more than one route.
For the user authentication, you can use User Account and Authentication (UAA) service or the Identity Authentication service.
User authentication is performed by the User Account and Authentication (UAA) server. In the run-time environment (on-premise and in the Cloud Foundry environment), a service is created for the UAA configuration; by using the standard service-binding mechanism, the content of this configuration is available in the <VCAP_SERVICES> environment variable, which the application router can access to read the configuration details.
The UAA service should have
xsuaa
in its tags or the environment variable <UAA_SERVICE_NAME> should be defined, for example, to specify the exact name of the UAA service to use.
A calling component accesses a target service by means of the application router only if there is no JSON Web Token (JWT) available, for example, if a user invokes the application from a Web browser. If a JWT token is already available, for example, because the user has already been authenticated, or the calling component uses a JWT token for its own OAuth client, the calling component calls the target service directly; it does not need to use the application router.
The application router does not “hide” the back-end microservices in any way; they remain directly accessible when bypassing the application router. So the back-end microservices must protect all their end points by validating the JWT token and implementing proper authorization scope checks.
The application router supports the use of the $XSAPPNAME
placeholder, which you can use in your route configuration, for example, in the scope
property for the specified route. The value of $XSAPPNAME
is taken from the UAA configuration (for example, the xsappname
property). For more information, see Routing Configuration File.
As an alternative to the User Account and Authentication service (UAA), you can also use Identity Authentication. This service provides authentication and single sign-on for users in the cloud. For more information, see the product page for SAP Cloud Identity Services - Identity Authentication on the SAP Help Portal.
If back end nodes respond to client requests with URLs, these URLs need to be accessible for the client. For this reason, the application router passes the following x-forwarding-*
headers to the client:
-
x-forwarded-host
Contains the host header that was sent by the client to the application router
-
x-forwarded-proto
Contains the protocol that was used by the client to connect to the application router
-
x-forwarded-for
Contains the address of the client which connects to the application router
-
x-forwarded-path
Contains the original path which was requested by the client from the approuter
If the application router forwards a request to a destination, it blocks the header
host
.
“Hop-by-hop” headers are meaningful only for a single transport-level connection; these headers are not forwarded by the application router. The following headers are classified as “Hop-By-Hop” headers:
-
Connection
-
Keep-Alive
-
Public
-
Proxy-Authenticate
-
Transfer-Encoding
-
Upgrade
You can configure the application router to send additional HTTP headers, for example, either by setting it in the httpHeaders
environment variable or in a local-http.headers.json
file.
local-http.headers.json
[ { "X-Frame-Options": "ALLOW-FROM http://localhost" }, { "Test-Additional-Header": "1" } ]
For security reasons, the following headers must not be configured:
Authorization
Set-Cookie
Cookie
The application router establishes a session with the client (browser) using a session cookie. The application router intercepts all session cookies sent by back-end services and stores them in its own session. To prevent collisions between the various session cookies, back-end session cookies are not sent to the client. On request, the application router sends the cookies back to the respective back-end services so the services can establish their own sessions.
Non-session cookies from back-end services are forwarded to the client, which might cause collisions between cookies. Applications should be able to handle cookie collisions.
You must not use multiple destinations with the same URL in an application router user session!
The application router stores the session cookies from the backend services in a user session according to the destination URLs for the backend services. If there are multiple destinations with the same URL, the application router cannot correctly send the cookies back to the backend services.
To avoid conflicts, the destination URLs must have different domains.
If there is no session in the application router, either because there has been a session timeout or because no session has been created yet, and if the incoming request matches a non-public route, the application router triggers a redirect to the authentication service (UAA or IAS).
After a successful login, a redirect back to application router takes place using the login callback endpoint, which triggers the creation of a new session. If the incoming request is an AJAX request (has the request header X-Requested-With: XMLHttpRequest
) or if the HTTP verb is not GET
and no session exists (there is no session cookie and the request doesn’t have an x-approuter-authorization header), the application router returns the response code 401 - Unauthorized
. This enables the client application to handle the 401 response before it navigates to the authentication service. For example, the application can store data entered by the user and prevent data loss. When the handling of the 401 response is completed, the client application should send a request without an xmlhttprequest
object to trigger the application router authentication flow.
A session established by the application router typically contains the following elements:
-
Redirect location
The location to redirect to after logon; if the request is redirected to a UAA logon form, the original request URL is stored in the session so that, after successful authentication, the user is redirected back to it.
-
CSRF token
The CSRF token value if it was requested by the clients. For more information about protection against Cross Site Request Forgery see CSRF Protection below.
-
OAuth token
The JSON Web Token (JWT) fetched from the User Account and Authentication service (UAA) and forwarded to back-end services in the
Authorization
header. The client never receives this token. The application router refreshes the JWT automatically before it expires (if the session is still valid). By default, this routine is triggered 5 minutes before the expiration of the JWT, but it can also be configured with the <JWT_REFRESH> environment variable (the value is set in minutes). If <JWT_REFRESH> is set to 0, the refresh action is disabled. -
OAuth scopes
The scopes owned by the current user, which are used to check if the user has the authorizations required for each request.
-
Back-end session cookies
All session cookies sent by back-end services.
The application router keeps all established sessions in local memory, and if multiple instances of the application router are running, there is no synchronization between the sessions. To scale the application router for multiple instances, session stickiness is used so that each HTTP session is handled by the same application router instance.
The application-router process should run with at least 256MB memory. The amount of memory actually required depends on the application the router is serving. The following aspects have an influence on the application's memory usage:
-
Concurrent connections
-
Active sessions
-
Size of the Java Web Token
-
Back-end session cookies
You can use the start-up parameter max-old-space-size
to restrict the amount of memory used by the JavaScript heap. The default value for max-old-space-size
is less than 2GB. To enable the application to use all available resources, the value of max-old-space-size
should be set to a number equal to the memory limit for the whole application. For example, if the application memory is limited to 2GB, set the heap limit as follows, in the application's package.json
file:
"scripts": { "start": "node --max-old-space-size=2048 node_modules/@sap/approuter/approuter.js" }
If the application router is running in an environment with limited memory, set the heap limit to about 75% of available memory. For example, if the application router memory is limited to 256MB, add the following command to your package.json
:
"scripts": { "start": "node --max-old-space-size=192 node_modules/@sap/approuter/approuter.js" }
For detailed information about memory consumption in different scenarios, see the Sizing Guide for the Application Router located in
approuter/approuter.js/doc/sizingGuide.md
.
The application router enables CSRF protection for any HTTP method that is not GET
or HEAD
and the route is not public. A path is considered public, if it does not require authentication. This is the case for routes with authenticationType: none
or if authentication is disabled completely via the top level property authenticationMethod: none
.
To obtain a CSRF token one must send a GET
or HEAD
request with a x-csrf-token: fetch
header to the application router. The application router will return the created token in a x-csrf-token: <token>
header, where <token>
will be the value of the CSRF token.
If a CSRF protected route is requested with any of the above mentioned methods, x-csrf-token: <token>
header should be present in the request with the previously obtained token. This request must use the same session as the fetch token request. If the x-csrf-token
header is not present or is invalid, the application router will return status code “403 - Forbidden”.
The application router supports integration with SAP Connectivity service. The connectivity service enables you to manage proxy access to Cloud Connector, which you can use to create tunnels for connections to systems located in private networks, for example, on-premise. To use the connectivity feature, you must create an instance of the connectivity service and bind it to the Approuter
application.
In addition, the relevant destination configurations in the <destinations> environment variable must have the proxy type "onPremise"
, for example, "proxyType": "onPremise"
. You must also ensure that you obtain a valid XSUAA logon token for the XS advanced User Account and Authentication service.
The application router uses the cf-nodejs-logging-support
package, giving you access to all its logging control features. For example, you can set all logging and tracing to the finest level by setting the CF_NODEJS_LOGGING_LEVEL
environment variable to debug
.
If you've deployed the application on Cloud Foundry, you can change the log level and restart the application using the following command:
cf set-env <application-name> CF_NODEJS_LOGGING_LEVEL debug
You can enable additional traces of incoming and outgoing requests by setting the <REQUEST_TRACE> environment variable to true
. When enabled, basic information will be logged for every incoming and outgoing request of the application router. Note that this could impact performance.
Some libraries used by the cf-nodejs-logging-support
package use other tracing mechanisms. For example, you can use the debug
package. By setting the `DEBUG` environment variable, you can enable additional traces.
Enabling the debug log level could lead to a very large amount of data being written to the application logs and trace files. The asterisk wild card (*) enables options that trace sensitive data that is then written to the logs and traces.
In addition, you can enable internal Node.js traces via the `NODE_DEBUG` environment variable.
Be cautious when enabling some of these options as they may trace security-sensitive data.
The cf-nodejs-logging-support
package sets the x-request-id
header in the application router's responses. This is useful if you want to search entries related to a particular request execution in the logs and traces of the application router. Note that the application router doesn't change the headers it receives from the backend and forwards to the client. If the backend is a Node.js
application using the cf-nodejs-logging-support
package (and also sets the x-request-id
header), the header value that the client receives will be the one from the backend, not the one from the application router.
You can also use the `XS_APP_LOG_LEVEL` environment variable for backward compatibility in SAP HANA extended application services, advanced model (XS advanced). If you've deployed the application on the XS advanced runtime for SAP HANA Platform 2.0, you can change the log level and restart the application using the following command:
xs set-env <application-name> XS_APP_LOG_LEVEL debug
Logging levels are application-specific and case-sensitive; they can be defined with lower-case characters (for example, “debug”) or upper-case characters (for example, “DEBUG”). An error occurs if you set a logging level incorrectly, for example, using lower-case characters “debug” where the application defines the logging level as “DEBUG”.
Related Information